Rogue per AP

Rogue per AP

Rogue detection is configured per AP or for a group of APs. The rogue AP detection is configured under the AP profile. The rogue AP detection configuration enabled by default and is part of the default AP profile.

The following commands are deprecated from this release:

  • wireless wps rogue detection enable

  • wireless wps rogue detection report-interval interval

  • wireless wps rogue detection min-rssi rssi

  • wireless wps rogue detection min-transient-time transtime

  • wireless wps rogue detection containment flex-connect

  • wireless wps rogue detection containment auto-rate

Enabling Rogue Detection

The following are the high-level steps to enable rogue detection:

  • Configure an AP Profile

  • Define a Wireless Site Tag and Assign the AP Profile

  • Associate the Wireless Site Tag to an AP


Note


The controller may not report the original min-rssi value due to conversions made by the AP and the controller. Hence, the reported min-rssi may be different from the original value.


Enabling Rogue Detection

Configure an AP profile (GUI)

Configure and customize AP join profiles for your wireless deployment.

Use this task to define, modify, or apply AP profile parameters such as country code, LED state, timers, VLAN tagging, security settings, management options, and advanced features, using the device’s graphical interface.

Before you begin

  • Review the default AP join profile to update parameters for your environment (For example, Control and Provisioning of Wireless Access Points (CAPWAP), IPv4 or IPv6, UDP Lite, High Availability, retransmit configuration parameters, global AP failover, Hyperlocation configuration parameters, Telnet or SSH, 11u parameters, and so on.)

  • Obtain required information, such as network-specific settings, controller addresses, credentials, and profile names.

Procedure


Step 1

Choose Configuration > Tags & Profiles > AP Join.

Step 2

On the AP Join Profile window, click Add.

The Add AP Join Profile window is displayed.

Step 3

In the General tab, enter a name and description for the AP join profile. The name can be ASCII characters from 32 to 126, without leading and trailing spaces.

Step 4

Check the LED State check box to set the LED state of all APs connected to the device to blink, making them easier to locate.

Step 5

In the Client tab and Statistics Timer section, enter the time in seconds that the AP sends its 802.11 statistics to the controller.

Step 6

In the TCP MSS Configuration section, check the Adjust MSS Enable check box to enter value for Adjust MSS. You can enter or update the maximum segment size (MSS) for transient packets that traverse a router. TCP MSS adjustment enables the configuration of the maximum segment size (MSS) for transient packets that traverse a router, specifically TCP segments with the SYN bit set.

In a CAPWAP environment, a lightweight AP discovers a device by using CAPWAP discovery mechanisms, and then sends a CAPWAP join request to the device. The device sends a CAPWAP join response to the AP that allows the AP to join the device.

When the AP joins the device, the device manages its configuration, firmware, control transactions, and data transactions.

Step 7

In the AP tab, you can configure these options:

  • General

  1. In the General tab, check the Switch Flag check box to enable switches.

  2. Check the Power Injector State check box if power injector is being used. Use power injectors to provide flexible powering options for APs, such as local power, multiport switches with inline power, or multiport power patch panels.

    Power Injector Selection parameter enables you to protect your switch port from an accidental overload if the power injector is inadvertently bypassed.

  3. From the Power Injector Type drop-down list, choose power injector type from these options:

    • Installed—This option examines and remembers the MAC address of the currently connected switch port and assumes that a power injector is connected. Choose this option if your network contains older Cisco 6-Watt switches and you want to avoid possible overloads by forcing a double-check of any relocated APs.

      If you want to configure the switch MAC address, enter the MAC address in theInjector Switch MAC Address text box. If you want the AP to find the switch MAC address, leave theInjector Switch MAC Address text box blank.

      Note

       

      Each time an AP is relocated, the MAC address of the new switch port fails to match the remembered MAC address, and the AP remains in low-power mode. You must then physically verify the existence of a power injector and reselect this option to cause the new MAC address to be remembered.

    • Override—This option allows the AP to operate in high-power mode without first verifying a matching MAC address. You can use this option if your network does not contain any older Cisco 6-W switches that could be overloaded if connected directly to a 12-W AP. The advantage of this option is that if you relocate the AP, it continues to operate in high-power mode without any further configuration. The disadvantage of this option is that if the AP is connected directly to a 6-W switch, an overload occurs.

  4. In theInjector Switch MAC field, enter the MAC address of the switch .

  5. From the EAP Type drop-down list, choose the EAP type as EAP-FAST , EAP-TLS , or EAP-PEAP.

  6. From the AP Authorization Type drop-down list, choose the type as either CAPWAP DTLS + or CAPWAP DTLS.

  7. In the Client Statistics ReportingInterval section, enter the interval for 5 GHz and 2.4 GHz radios in seconds.

  8. Check the Enable check box to enable extended module.

  9. From the Profile Name drop-down list, choose a profile name .

  10. Click Save & Apply to Device.

  • Hyperlocation: Cisco Hyperlocation is a location solution that allows to track the location of wireless clients with the accuracy of one meter. Selecting this option disables all other fields in the screen, except NTP Server.

  1. In the Hyperlocation tab, check the Enable Hyperlocation check box.

  2. Enter the Detection Threshold value to filter out packets with low RSSI. The valid range is –100 dBm to –50 dBm.

  3. Enter the Trigger Threshold value to set the number of scan cycles before sending a BAR to clients. The valid range is zero to 99.

  4. Enter the Reset Threshold value to reset value in scan cycles after trigger. The valid range is zero to 99.

  5. Enter the NTP Server IP address.

  6. Click Save & Apply to Device.

  • BLE: If your APs are Bluetooth Low Energy (BLE) enabled, they can transmit beacon messages that are packets of data or attributes transmitted over a low energy link. These BLE beacons are frequently used for health monitoring, proximity detection, asset tracking, and in-store navigation. For each AP, you can customize BLE Beacon settings configured globally for all APs.

  1. In the BLE tab, enter a value in the BeaconInterval field to indicate how often you want your APs to send out beacon advertisements to nearby devices. The range is from one to 10, with a default value of one.

  2. In the Advertised Attenuation Level field, enter the attenuation level. The range is from 40 to 100, with a default of 59.

  3. Click Save & Apply to Device.

  • Packet Capture: Packet Capture feature allows to capture the packets on the AP for the wireless client troubleshooting. The packet capture operation is performed on the AP by the radio drivers on the current channel on which it is operational, based on the specified packet capture filter.

  1. In the Packet Capture tab, choose an AP Packet Capture Profile from the drop-down list.

  2. You can also create a new profile by clicking the + sign.

  3. Enter a name and description for the AP packet capture profile.

  4. Enter the Buffer Size.

  5. Enter the Duration.

  6. Enter the Truncate Length information.

  7. In the Server IP field, enter the IP address of the TFTP server.

  8. In the File Path field, enter the directory path.

  9. Enter the username and password details.

  10. From the Password Type drop-down list, choose the type.

  11. In the Packet Classifiers section, use the option to select or enter the packets to be captured.

  12. Click Save.

  13. Click Save & Apply to Device.

Step 8

In the Management tab, you can configure these options:

  • Device

  1. In the Device tab, enter the IPv4/IPv6 Address of the TFTP server, TFTP Downgrade section.

  2. In the Image File Name field, enter the name of the software image file.

  3. From the Facility Value drop-down list, choose the appropriate facility.

  4. Enter the IPv4 or IPv6 address of the host.

  5. Choose the appropriate Log Trap Value.

  6. Enable Telnet, SSH or both configurations, if required.

  7. Enable core dump, if required.

  8. Click Save & Apply to Device.

  • User

  1. In the User tab, enter username and password details.

  2. Choose the appropriate password type.

  3. In the Secret field, enter a custom secret code.

  4. Choose the appropriate secret type.

  5. Choose the appropriate encryption type.

  6. Click Save & Apply to Device.

  • Credentials

  1. In the Credentials tab, enter local username and password details.

  2. Choose the appropriate local password type.

  3. Enter 802.1x username and password details.

  4. Choose the appropriate 802.1x password type.

  5. Enter the time in seconds after which the session should expire.

  6. Enable local credentials, 802.1x credentials, or both as required.

  7. Click Save & Apply to Device.

  1. In the CDPInterface tab, enable the CDP state, if required.

  2. Click Save & Apply to Device.

Step 9

In the Rogue AP tab, check the Rogue Detection check box to enable rogue detection.

Step 10

In the Rogue Detection Minimum RSSI field, enter the RSSI value.

This field specifies the minimum RSSI value for which a Rogue AP should be reported. All Rogue APs with RSSI lower than what is configured will not be reported to controller.

Step 11

In the Rogue Detection TransientInterval field, enter the transient interval value.

This field indicates how long the Rogue AP should be seen before reporting the controller.

Step 12

In the Rogue Detection ReportInterval field, enter the report interval value.

This field indicates the frequency (in seconds) of Rogue reports sent from AP to controller.

Step 13

Check the Rogue Containment Automatic Rate Selection check box to enable rogue containment automatic rate selection.

The AP selects the best rate for the target Rogue, based on its RSSI.

Step 14

Check the Auto Containment on FlexConnect Standalone check box to enable the feature.

The AP continues containment if it moves to FlexConnect standalone mode.

Step 15

Click Save & Apply to Device.


The AP join profile is created or updated. Devices assigned to this profile use its configuration for network operation and management.

What to do next

  • Verify that APs have successfully joined and received the new settings by reviewing AP status.

  • Adjust profile settings as necessary for site-specific needs or to resolve configuration issues.

Configure an AP Profile

Follow the procedure given below to configure an AP profile:

Procedure

  Command or Action Purpose

Step 1

configure terminal

Example:

Device# configure terminal

Enters the global configuration mode.

Step 2

ap profile ap-profile

Example:

Device(config)# ap profile xyz-ap-profile

Configures an AP profile and enters the ap profile configuration mode.

Step 3

description ap-profile-name

Example:

Device(config-ap-profile)# description "xyz ap profile"

Adds a description for the ap profile.

Step 4

rogue detection enable

Example:

Device(config-ap-profile)# rogue detection enable

Enables rogue detection for individual access points.

Rogue detection is enabled by default. Use this command if rogue detection is disabled.

Step 5

rogue detection report-interval interval

Example:

Device(config-ap-profile)# rogue detection report-interval 12

Specifies the time interval, in seconds, at which APs should send the rogue detection report to the embedded controller.

The default value for interval is 10.

Step 6

rogue detection min-rssi rssi

Example:

Device(config-ap-profile)# rogue detection min-rssi –128

Specifies the minimum RSSI value that rogues should have for APs to detect them.

The minimum RSSI value is –128.

Step 7

rogue detection min-transient-time transtime

Example:

Device(config-ap-profile)# rogue detection min-transient-time 120

Specifies the time interval at which rogues have to be consistently scanned for by APs after the first time the rogues are scanned.

The lowest value for minimum transient time is 0.

Step 8

rogue detection containment flex-connect

Example:

Device(config-ap-profile)# rogue detection containment flex-connect

Sets the auto containment options for standalone FlexConnect access points.

By default, this option is disabled.

Step 9

rogue detection containment auto-rate

Example:

Device(config-ap-profile)# rogue detection containment auto-rate

Sets the auto rate for containment of rogues.

By default, auto-rate is disabled.

Define a Wireless Site Tag and Assign an AP Profile (GUI)

Procedure


Step 1

Choose Configuration > Tags & Profiles > Tags.

Step 2

On the Tags page, click the Site tab and click Add.

Step 3

In the Add Site Tag window, enter the name in the name field.

Step 4

Choose the AP profile from the AP Join Profile drop-down list.

Step 5

Click Save & Apply to Device.


Define a Wireless Site Tag and Assign an AP Profile (CLI)

Procedure

  Command or Action Purpose

Step 1

configure terminal

Example:

Device# configure terminal

Enters the global configuration mode.

Step 2

wireless tag sitesite-tag

Example:

Device(config)# wireless tag site default-site-tag

Enters the wireless site tag configuration mode.

Step 3

ap-profile ap-profile

Example:

Device(config-site-tag)# ap-profile xyz-ap-profile 

Assigns an AP profile to the wireless site.

Step 4

exit

Example:

Device(config-site-tag)# exit

Returns to the global configuration mode.

Associating Wireless Tag to an AP (GUI)

Procedure


Step 1

Choose Configuration > Tags & Profiles > Tags.

Step 2

Click AP tab to configure the following:

  • Tag Source

  • Static

  • Filter

Step 3

In the Static tab, click Add to perform the following:

  1. Enter a MAC address.

  2. Choose the appropriate Policy Tag Name, Site Tag Name, and RF Tag Name.

  3. Click Save & Apply to Device.

Step 4

In the Filter tab, click Add to perform the following:

  1. Enter a rule and AP name.

  2. Use the slider to enable Active.

  3. Enter the priority. The valid range is from 0 to 127.

  4. Choose the appropriate Policy Tag Name, Site Tag Name, and RF Tag Name.

  5. Click Save & Apply to Device.


Associate Wireless Tag to an AP (CLI)

Follw the procedure given below to apply the rogue configuration defined under ap profile to the AP.


Note


If the AP is not explicitly associated to a non-default site tag, it will be associated to default-site-tag and resultantly the default-ap-profile rogue configuration will be used.


Procedure

  Command or Action Purpose

Step 1

configure terminal

Example:

Device# configure terminal

Enters the global configuration mode.

Step 2

ap mac-address

Example:

Device(config)# ap F866.F267.7DFB 

Configures Cisco APs and enters the ap configuration mode.

Step 3

site-tag site-tag-name

Example:

Device(config-ap-tag)# site-tag sitetag1

Maps a wireless site tag to the AP.